Dear /dev/null, You can try this one:
DigitalScream, Windows named pipes exploitation http://www.phrack.org/phrack/61/p61-0x03_Linenoise.txt In addition to explanations there are references to real-world exploits. --Friday, May 12, 2006, 6:16:11 PM, you wrote to [email protected]: dn> Hello list, dn> does anyone know a practical example of named pipe attack to escalate dn> privileges in Windows environment? I'm trying to learn more about named pipe dn> attacks so any link/paper suggestion would be much appreciated (I already dn> found "Discovering and Exploiting Named Pipe Security Flaws for Fun and dn> Profit"). dn> Thank you very much. dn> -E. dn> ____________________ dn> http://www.email.si/ dn> _______________________________________________ dn> Full-Disclosure - We believe in it. dn> Charter: http://lists.grok.org.uk/full-disclosure-charter.html dn> Hosted and sponsored by Secunia - http://secunia.com/ -- ~/ZARAZA Электрические шоки очень полезны для формирования характера. (Лем) _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
